Research Article

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing

Table 2

The summary of schemes.

SchemeS/ASMultiple data ownersMultiple keysCipher comparisonSecurityMultidimensional data

[22]AS
[23]S
[26]AS
[30]AS
[34]AS
[19]AS
OursAS

S/AS: symmetric/asymmetric.